Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Basically:

* Normally you can't access Chrome's decrypted cookie storage unless you're in an interactive session and you've unlocked the keychain.

* An attacker running code on your computer (nefarious NPM package, etc) can spawn a headless chrome session with remote debugging enabled and then slurp out all the decrypted cookies through the remote debugging socket

Chrome is very frightening to me. It's just this massive God program that has a huge attack surface and a lot of really valuable goodies like this that attackers would love to get at.



Most desktop OSes aren't designed to defend applications run by the same user from one another. As a consequence an attacker running unsandboxed code with your user privileges is an attack that's very difficult to defend against.


Chrome is very frightening to me. It's just this massive God program that has a huge attack surface and a lot of really valuable goodies like this that attackers would love to get at.

I think the right way to look at it is that it's a smaller OS. Different in nature, but browsers are now in the OS league for how much damage a compromise can do.


You can steal Firefox cookies and even passwords easier, they're stored unencrypted in the user profile directory.


You can set a master password


yes i know


But Chrome can't access it until you've unlocked the keychain either, which means this "exploit" doesn't do anything...

Also I don't know about you but I've never needed to enter a password to start Chrome, so...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: